Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
28 commits
Select commit Hold shift + click to select a range
ab3b588
Revise README with new team name and instructions
priyanshu5ingh Apr 15, 2026
7303422
Remove final README template header
priyanshu5ingh Apr 15, 2026
946f282
Added all the information asked regrading our ps- statment
Mahesharunaladi Apr 15, 2026
b18838c
Added all the information asked regrading our ps- statment
Mahesharunaladi Apr 15, 2026
8c9d69d
Update README.md
sachinchetty27 Apr 15, 2026
c497a8c
Added all the information asked regrading our ps- statment
Mahesharunaladi Apr 15, 2026
94b2ddc
added readme
Mahesharunaladi Apr 15, 2026
d9e6bbf
added readme
Mahesharunaladi Apr 15, 2026
a19e044
added readme
Mahesharunaladi Apr 15, 2026
6a6bb63
added readme
Mahesharunaladi Apr 15, 2026
be010d6
added readme
Mahesharunaladi Apr 15, 2026
c274031
added readme
Mahesharunaladi Apr 15, 2026
a17986f
added readme
Mahesharunaladi Apr 15, 2026
304b346
added readme
Mahesharunaladi Apr 15, 2026
99eb9fe
added readme
Mahesharunaladi Apr 15, 2026
ce8300c
added readme
Mahesharunaladi Apr 15, 2026
4942772
Phase 1: Aegis Sovereign - Zero Trust Observability Dashboard Impleme…
Apr 15, 2026
5a78347
Phase 2: Core Engineering - Scaffolding, state management, and pollin…
Apr 16, 2026
66de459
Phase 3: High-Fidelity UI - Integrated 5-view component architecture …
Apr 16, 2026
7ab8f0b
Final: Repository cleanup and utility synchronization
Apr 16, 2026
10326a6
feat: complete AEGIS-DID identity binding and rebranding
Apr 16, 2026
3bb9112
fix: import ShieldAlert to fix rendering crash
Apr 16, 2026
7b17fb4
feat: complete multi-laptop hacker terminal and vite sync relay
Apr 16, 2026
3eae11d
feat: functional autonomy modes and complex hacker UI
Apr 16, 2026
b39c1a0
feat: added chronological Authentication boot screen sequence
Apr 16, 2026
2d0e8b1
fix: reset login sync state and enrich hacker identity stream
Apr 16, 2026
aa9e510
docs: add tech stack and execution steps to README
Apr 16, 2026
be4cce4
Implement real auth and backend hardening
Apr 17, 2026
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 6 additions & 0 deletions .env.example
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
SPIRE_JOIN_TOKEN=
PARSEABLE_USERNAME=
PARSEABLE_PASSWORD=
PARSEABLE_BASIC_AUTH=
GRAFANA_ADMIN_PASSWORD=
FRONTEND_ORIGINS=http://localhost:5173
65 changes: 65 additions & 0 deletions .gitignore
Original file line number Diff line number Diff line change
@@ -0,0 +1,65 @@
# Dependency directories
node_modules/
jspm_packages/
.npm/

# Build outputs
dist/
build/
.next/
out/
bin/
obj/

# Logs
*.log
npm-debug.log*
yarn-debug.log*
yarn-error.log*
mock_agent_eval.log
mock_full.log
local_log.txt

# Environment variables
.env
.env.local
.env.development.local
.env.test.local
.env.production.local
*.env

# OS Files
.DS_Store
Thumbs.db

# IDEs
.vscode/
.idea/
*.swp
*.swo

# Docker
.docker

# Python
__pycache__/
*.py[cod]
*$py.class
.venv/
venv/
ENV/
env/
.pytest_cache/
.coverage
htmlcov/

# Local data volumes
parseable-data/
parseable-staging/
spire-server-data/

# Specific project junk
mock_result.txt
spiffe_init.py
read_log.py
Command_Center_Matrix.bat
5 changes: 5 additions & 0 deletions Dockerfile.enforcement-bridge
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
FROM python:3.11-slim
WORKDIR /app
RUN pip install requests --no-cache-dir
COPY enforcement_bridge.py .
CMD ["python", "enforcement_bridge.py"]
5 changes: 5 additions & 0 deletions Dockerfile.tetragon-processor
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
FROM python:3.11-slim
WORKDIR /app
RUN pip install requests --no-cache-dir
COPY tetragon_processor.py .
CMD ["python", "tetragon_processor.py"]
241 changes: 195 additions & 46 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,86 +1,235 @@
# HackToFuture 4.0 — Template
# TEAM DOLLAR$IGN (C06)

Welcome to your official HackToFuture 4 repository.

This repository template will be used for development, tracking progress, and final submission of your project. Ensure that all work is committed here within the allowed hackathon duration.
## Problem Statement :T2PS1

---

### Instructions for the teams:

- Fork the Repository and name the forked repo in this convention: hacktofuture4-team_id (for eg: hacktofuture4-A01)

---
### Project Analysis: Aegis-DID

## Rules
## What is the Problem?

- Work must be done ONLY in the forked repository
- Only Four Contributors are allowed.
- After 36 hours, Please make PR to the Main Repository. A Form will be sent to fill the required information.
- Do not copy code from other teams
- All commits must be from individual GitHub accounts
- Please provide meaningful commits for tracking.
- Do not share your repository with other teams
- Final submission must be pushed before the deadline
- Any violation may lead to disqualification
Traditional authentication mechanisms (such as passwords or Single Sign-On) are designed to verify identity only at the initial point of login
. This creates a significant security gap for autonomous AI agents that maintain persistent, long-running sessions
. If an agent's token is stolen or its intent is hijacked via prompt injection during a session, attackers can achieve unrestricted lateral movement across a network at machine speed
. Furthermore, Non-Human Identities (NHIs) now outnumber human identities by a ratio of 50:1, making NHI exploitation the top cybersecurity threat in modern enterprises


## Why is it important?

* **This project is critical because it moves beyond static security to a proactive, self-healing defense**
* **Its importance is highlighted by several key factors :**

* **Credential Security:** It reduces the window of exposure for stolen credentials by 75% through the use of ephemeral, short-lived identities

* **Regulatory Compliance:** It directly implements requirements for the Cloud Security Alliance's (CSA) new Agentic Trust Framework (ATF), providing a standard for governing non-human actors

* **Scalability:** By using a decentralized authentication model, it allows millions of machine-to-machine interactions to scale without creating a bottleneck at a central Identity Provider (IdP)

* **System Integrity:**
It ensures that the safety of enterprise systems depends on rigorous monitoring and autonomous containment rather than just the "intelligence" of the AI itself

---

# The Final README Template
## Who are the target users?

## Problem Statement / Idea
* **Enterprises using Autonomous AI:** Organizations that deploy AI agents to handle sensitive data or interact with internal APIs and databases

Clearly describe the problem you are solving.
* **Cloud & Infrastructure Teams:** Users operating in Kubernetes and Docker environments who need to securely scope and manage machine identities

- What is the problem?
- Why is it important?
- Who are the target users?
* **Cybersecurity & Compliance Officers:** Professionals who must ensure their AI deployments align with emerging standards like the CSA’s Agentic Trust Framework

* **Developers of Agentic AI:** Those building the next generation of autonomous intelligence who require a decentralized infrastructure to safely scale their applications
---

## Proposed Solution
### Proposed Solution



## What are we building?

I am building Aegis-DID (Agentic Ephemeral Governance & Identity System), a decentralized Zero Trust architecture specifically designed for the era of autonomous AI agents

* This system is a closed-loop security framework that integrates cryptographic identity (using SPIFFE/SPIRE), kernel-level observability (via eBPF), and AI-driven analytics (using Neo4j and PyTorch) to manage and secure non-human identities

* It is designed to run in modern orchestration environments like Kubernetes and Docker, ensuring that every AI workload has a verified, verifiable, and temporary identity

### How does it solve the problem?

* **Traditional security models fail because they only verify an identity at the initial login, which is insufficient for AI agents that maintain long, persistent sessions**

* **Aegis-DID solves this by shifting to a continuous identity verification model**

Explain your approach:
* **Eliminating Static Risk:** Instead of using permanent API keys, the system issues highly ephemeral cryptographic identity documents (SVIDs) that expire in minutes or seconds, reducing the time a stolen credential can be used by 75%

- What are you building?
- How does it solve the problem?
- What makes your solution unique?
* **Monitoring Behavioral Intent:** While the agent is active, the system uses eBPF and OpenTelemetry to capture real-time telemetry

* **A causal inference engine then analyzes this data to detect "intent drift"—signs that an agent’s behavior has been hijacked, perhaps through a prompt injection attack**

* **Autonomous Containment:** If the system detects suspicious behavior, the agent’s Trust Score drops

* **This immediately triggers the Open Policy Agent (OPA) to autonomously strip the agent of its permissions or use Kubernetes NetworkPolicies to physically isolate the compromised pod, "self-healing" the perimeter at machine speed**

## What makes your solution unique?
* **Our approach is unique because it moves beyond simple authentication to dynamic, behavior-gated governance**

* **Zero-Instrumentation Monitoring:** By using eBPF, we can monitor an agent's activities at the kernel level without needing to modify the agent's code or adding any performance latency

* **Decentralized Scalability:** Unlike traditional systems that rely on a central Identity Provider (IdP) which can become a bottleneck, our decentralized architecture allows millions of machine-to-machine interactions to scale efficiently

* **Causal Behavioral Mapping:** We utilize Neo4j to construct StateGraphs of agent behavior, allowing us to compare real-time actions against historical baselines using advanced causal inference, which is more sophisticated than simple rule-based security

* **Regulatory Alignment:** Aegis-DID is one of the first systems to directly implement the requirements of the Cloud Security Alliance’s (CSA) Agentic Trust Framework (ATF), providing a ready-made path for enterprises to meet new safety standards for non-human actors

---

## Features

List the core features of your project:
# 🛡️ Aegis-DID: Core Features

### 1. Decentralized Identity Plane (DID-Layer)
Aegis-DID eliminates the "Point-of-Failure" bottleneck of centralized Identity Providers (IdPs) by leveraging self-sovereign identity standards.
* **W3C-Compliant DIDs & VCs:** Assigns unique Decentralized Identifiers and Verifiable Credentials to every agent, providing an immutable cryptographic anchor.
* **Local Public-Key Verification:** Enables microservices to authenticate agents at the edge without querying a central server, reducing latency by **50%**.
* **Hardware Root of Trust:** Integrates with **SPIFFE/SPIRE** to bind identities to specific Kubernetes workloads and hardware signatures.

- Feature 1
- Feature 2
- Feature 3
### 2. Behavioral Biometrics & Causal Inference
Security that monitors what an agent *does*, not just what it *shows*.
* **eBPF-Powered Telemetry:** Uses Extended Berkeley Packet Filter technology for zero-instrumentation monitoring of kernel-level API calls and network traffic.
* **Causal Discovery Engine:** Employs **Neural Granger Causality** to build dynamic StateGraphs of agent behavior. It distinguishes between complex reasoning and malicious "Confused Deputy" attacks or prompt injections.
* **Real-time Trust Scoring ($T_{a,t}$):** A continuous, mathematically derived score that fluctuates based on behavioral alignment with the agent’s historical MetaGraph.

### 3. Adaptive Ephemeral Governance
Aegis-DID transitions security from binary "Allow/Deny" to a fluid, risk-adjusted posture.
* **Dynamic Token TTL:** Access tokens feature a non-linear Time-to-Live. As an agent's Trust Score drops, its token lifespan aggressively shrinks (e.g., from 60s to 5s), forcing high-frequency re-authentication.
* **MCP Scoping & ABAC:** Native integration with the **Model Context Protocol (MCP)**. It dynamically strips write permissions or restricts tool access via Attribute-Based Access Control if the agent's intent becomes ambiguous.

### 4. Autonomous Containment & Self-Healing
Immediate, machine-speed response to identity compromise.
* **Automated Pod Isolation:** Automatically triggers Kubernetes **NetworkPolicies** to "Default-Deny" the moment a trust threshold is breached, preventing lateral movement.
* **Global Revocation Broadcast:** Instantly invalidates VCs across the entire distributed ledger, terminating all active sessions globally.
* **Immutable Forensic Snapshots:** Captures the final memory state, prompt history, and execution trace of quarantined agents for cryptographically signed audit trails.

---

## Tech Stack

Mention all technologies used:
### Frontend

- React 19
- Vite
- Tailwind CSS
- Recharts
- Lucide React

### Backend and AI Services

- Python 3.11
- FastAPI (analytics API)
- Uvicorn
- Sentence Transformers (all-MiniLM-L6-v2)
- PyTorch

### Identity and Security

- SPIFFE/SPIRE (workload identity)
- eBPF observability via Cilium Tetragon
- OPA-style policy enforcement flow in the demo narrative

### Observability and Logging

- Fluent Bit
- Parseable
- Grafana

- Frontend:
- Backend:
- Database:
- APIs / Services:
- Tools / Libraries:
### DevOps and Runtime

- Docker
- Docker Compose
- Node.js and npm

---

## Project Setup Instructions

Provide clear steps to run your project:
### Prerequisites

Install the following before running the project:

- Docker Desktop (with Docker Compose)
- Node.js 20+ and npm
- Git

### 1. Clone the repository

```bash
# Clone the repository
git clone <repo-link>
git clone https://github.com/priyanshu5ingh/hacktofuture4-C06.git
cd hacktofuture4-C06
```

# Install dependencies
...
### 2. Start backend and infrastructure services

# Run the project
...
From the project root, run:

```bash
docker compose up -d --build
```

Before starting the stack, set these environment variables in a local `.env` file or your shell:

- `SPIRE_JOIN_TOKEN`
- `PARSEABLE_USERNAME`
- `PARSEABLE_PASSWORD`
- `PARSEABLE_BASIC_AUTH`
- `GRAFANA_ADMIN_PASSWORD`
- `FRONTEND_ORIGINS` (optional, defaults to `http://localhost:5173`)

This brings up:

- analytics-engine on port 8000
- parseable on port 8081
- grafana on port 3000
- spire-server, spire-agent, mock-agent, tetragon, fluent-bit

### 3. Start the frontend

Open a second terminal:

```bash
cd frontend
npm install
npm run dev
```

The UI will be available at:

- http://localhost:5173

### 4. Useful service URLs

- Frontend: http://localhost:5173
- Analytics API docs: http://localhost:8000/docs
- Grafana: http://localhost:3000/login (default credentials: admin / admin)
- Parseable: http://localhost:8081

### 5. Verify containers are healthy

From the project root:

```bash
docker compose ps -a
```

### 6. Stop the stack

```bash
docker compose down
```








7 changes: 7 additions & 0 deletions analytics_engine/Dockerfile
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
FROM python:3.11-slim
WORKDIR /app
COPY requirements.txt .
RUN pip install --no-cache-dir -r requirements.txt
COPY engine.py .
EXPOSE 8000
CMD ["uvicorn", "engine:app", "--host", "0.0.0.0", "--port", "8000"]
Loading